Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LinkedIn’s Secret Browser Extension Scan Sparks Privacy Concerns

LinkedIn’s Secret Browser Extension Scan Sparks Privacy Concerns

Posted on April 4, 2026 By CWS

A recent investigation has unveiled that LinkedIn, the prominent professional networking platform owned by Microsoft, is covertly scanning users’ browsers for installed extensions without their knowledge. This activity, discovered by the advocacy group Fairlinked e.V. under the campaign ‘BrowserGate,’ has raised significant privacy concerns among LinkedIn’s one billion users.

Uncovering the Hidden Code

The investigation revealed that LinkedIn’s JavaScript code silently scans for browser extensions every time a user accesses the site via Chrome-based browsers. This process, which identifies extensions by attempting to access certain files, operates without any visible signs to the user. The information collected is then encrypted and sent back to LinkedIn’s servers, as well as to external entities.

Implications of Covert Scanning

A significant aspect of this hidden surveillance is its potential impact on user privacy. As LinkedIn profiles are linked to real identities and workplaces, the data gathered provides detailed insights into users’ software preferences. This includes extensions related to job searches, religious beliefs, political views, and more. Such data, categorized as Special Category Data under GDPR, should not be processed without explicit consent, which LinkedIn currently lacks.

Wider Surveillance Network

Beyond LinkedIn’s servers, the BrowserGate investigation highlighted additional tracking elements from HUMAN Security, a cybersecurity firm known for its technology embedded in numerous websites. This element, along with scripts from LinkedIn and Google, collects data to create comprehensive device profiles of users, all without disclosure or consent.

LinkedIn has reportedly utilized this data to target users of competing services, even expanding its scan list from 461 products in 2024 to over 6,000 by early 2026. Legal actions are being considered as the practice is deemed illegal across various jurisdictions.

Steps for User Protection

Concerned users can take several measures to safeguard their privacy: utilizing Firefox or Safari for LinkedIn access, creating a dedicated Chrome profile with no extensions, or employing the Brave browser with fingerprinting protection. Additionally, users can review their browser extensions against BrowserGate’s public database.

As legal proceedings develop, LinkedIn users on Chromium browsers remain subject to this ongoing surveillance. Stay informed by following updates on Google News and other platforms.

Cyber Security News Tags:browser extensions, BrowserGate, Chrome, data breach, data security, Fairlinked, GDPR, HUMAN Security, LinkedIn, Privacy

Post navigation

Previous Post: Anthropic Ends Third-Party Tool Access for Claude
Next Post: Top User Access Management Tools for 2026

Related Posts

Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild Cyber Security News
Ransomware Groups Exploit AzCopy for Data Theft Ransomware Groups Exploit AzCopy for Data Theft Cyber Security News
Microsoft Teams Guest Chat Vulnerability Exposes Users to Malware Attack Microsoft Teams Guest Chat Vulnerability Exposes Users to Malware Attack Cyber Security News
How ShinyHunters Breached Google, Adidas, Louis Vuitton and More in Salesforce Attack Campaign How ShinyHunters Breached Google, Adidas, Louis Vuitton and More in Salesforce Attack Campaign Cyber Security News
ChatGPT Tricked Into Bypassing CAPTCHA Security and Enterprise Defenses ChatGPT Tricked Into Bypassing CAPTCHA Security and Enterprise Defenses Cyber Security News
Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS, CI/CD and macOS Data Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS, CI/CD and macOS Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Drupal Vulnerability Patch Scheduled for Release
  • Apache Flink Vulnerability Risks Remote Code Execution
  • Cyber Resilience: Key to Modern Business Continuity
  • DirtyDecrypt Exploit PoC for Linux Kernel Vulnerability Released
  • GitHub Action Hack Exposes Developer Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Drupal Vulnerability Patch Scheduled for Release
  • Apache Flink Vulnerability Risks Remote Code Execution
  • Cyber Resilience: Key to Modern Business Continuity
  • DirtyDecrypt Exploit PoC for Linux Kernel Vulnerability Released
  • GitHub Action Hack Exposes Developer Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark